I have around ten years of experience working in the finance industry.
I am evaluating Corelight and Vectra AI. What is the biggest difference between the two? Which would you recommend?
Thanks! I appreciate the help.
The two platforms take a fundamentally different approach to NDR. Corelight is limited to use cases that require the eventual forwarding of events and parsed data logs to a security team’s SIEM or data lake. You then rely on an open-source community for things like detections.
Vectra not only does that – but also enriches the underlying data. It is also delivered as an investigative workbench that includes out-of-box detections that highlight and prioritize attacker behaviors and campaigns. Perhaps just as importantly, Corelight has few integrations whereas Vectra natively integrates with parts of infrastructure like EDR, orchestration and network security products.
Head of Information Security at a insurance company with 1,001-5,000 employees
05 January 20
People do a lot more than we actually see. Looking at the test and development guys, sometimes they do things that they don't understand. So, they will do it because it works. The actual things that are behind the scenes are the sort of things that happen, and they don't really understand. If there's something that's really complicated, they're people that have initiated it that don't really know what it is. That is always a problem, because in our sort of company, we have a lot of developers who are doing a lot of coding and things like that, but they're not 100 percent on all the other things that they affect, such as the supporting applications underneath it. They are making a change on one particular app, but it's using the other apps underneath it to develop that and push that across to something else. All these extra, different steps that they are completely oblivious to where we go, "Actually, you've just done this." They go, "Well, I don't know, I just ran the script over here. I don't know why that would happen." But, it'll do a LDAP lookup or connect to a share. Those are the sort of things that you get a lot of visibility from people who don't understand. So, that can become tricky. That's pretty much par for the course for a lot of security tool sets. Where you have a couple of people who know one particular aspect, but don't really understand everything that's going on. To be fair, IT is a big area. You can't expect everyone to know everything of everything, not when you're not working in a massive IT structure, and the security team is a small department. You need to be quite key on your business case and what you're expecting from it. Be 100 percent sure on your use cases. It's an excellent tool. It doesn't create a huge amount of overhead, but it is a tool that you need to keep on top of. The more you keep on top of it and get it right at the start, the easier it will make your life going forward. Don't just stick it in, then leave it to whirl away as a lot of people do. You have to spend that bit of extra time, and it's not huge amount of time, and leverage other teams. The way they do their customer success is really good. There's nothing bad that I've got to say apart from the costs, but nothing's free, is it? It has to be up there with my favorite security tool set at the moment. I am quite lean on scores, but the solution is definitely nine (out of 10). If I look at all my other security tool sets, this is the one that my guys value the most.
Cyber Security Analyst at a financial services firm with 1,001-5,000 employees
12 January 20
Start small and simple. Work with the Vectra support team. The solution’s ability to reduce false positives and help us focus on the highest-risk threats is the tricky part because we are still doing the filtering. The things it sees are out of the ordinary and anomalous. In our company, we have a lot of anomalous behavior, so it's not the tool. Vectra is doing what it's supposed to do, but we need to figure out whether that anomalous behavior is normal for our company. The majority of the findings are misconfigurations of servers and applications. That's the majority of things that I'm investigating at the moment. These are not security risks, but need to be addressed. We have more of those than I expected, which is good, but not part of my job. While it's good that Vectra detects misconfiguratons, there are not our primary goal. The solution is an eight (out of 10). We don't investigate our cloud at the moment.
Enterprises are increasingly facing multiple network monitoring challenges, like tracking, monitoring, and improving network performance. Addressing these challenges with a Network Traffic Analysis (NTA) solution helps an organization avoid various network monitoring challenges with proactive strategies. PeerSpot real users of Network Traffic Analysis note the advantages of this type of solut...
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias.
Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why.
You can read user reviews for the Top 8 Network Detection and Response (ND...